PT-2025-46473 · Microsoft · Host Process For Windows Tasks+1
Published
2025-11-11
·
Updated
2026-04-16
·
CVE-2025-60710
CVSS v3.1
7.8
High
| AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Windows versions (affected versions not specified)
Description
An issue exists that allows for local privilege escalation. The problem stems from improper link resolution before file access ('link following') within the Host Process for Windows Tasks. Specifically, the vulnerability resides in the handling of the
C:Users%username%AppDataLocalCoreAIPlatform.00UKP directory and the deletion of directories matching the filter {????????-????-????-????-????????????} without verifying symbolic links. A low-privilege user can create directories within their %LOCALAPPDATA% folder, leading to arbitrary folder deletion under the NT AUTHORITYSYSTEM user context. This affects the MicrosoftWindowsWindowsAIRecallPolicyConfiguration scheduled task.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
LPE
Link Following
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Host Process For Windows Tasks
Windows